First published: Sat May 06 2017(Updated: )
The OS Installation Management component in CA Client Automation r12.9, r14.0, and r14.0 SP1 places an encrypted password into a readable local file during operating system installation, which allows local users to obtain sensitive information by reading this file after operating system installation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Client Automation | =r12.9 | |
Broadcom Client Automation | =r14.0 | |
Broadcom Client Automation | =r14.0-sp1 | |
Linux kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8391 is classified as a medium severity vulnerability due to the exposure of sensitive information.
To resolve CVE-2017-8391, update to a version of CA Client Automation that does not expose encrypted passwords in local files.
The affected versions of CA Client Automation are r12.9, r14.0, and r14.0 SP1.
Yes, local users can exploit CVE-2017-8391 by reading the readable local file that contains the encrypted password.
CVE-2017-8391 specifically affects CA Client Automation on Linux and is not relevant to Windows systems.